نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

Journal: :EURASIP Journal on Wireless Communications and Networking 2020

Journal: :ComTech: Computer, Mathematics and Engineering Applications 2013

Journal: :International Journal of Software Engineering & Applications 2013

Journal: :DEStech Transactions on Computer Science and Engineering 2018

Journal: :مجله علوم اعصاب شفای خاتم 0
maryam jafarian shefa neuroscience research center, khatam alanbia hospital, tehran, iran

traumatic brain injury (tbi) is a common injury leading to child disability and is associated with a variety of long-term cognitive, social, and behavioral dysfunctions. emotion perception (ep) starts up an integral part of social communication is critical to achieve developmentally appropriate goals. this skill, which emerges relatively early in development, is driven by increasing connectivit...

2007
HUA CHEN TAO ZOU DONGXIA WANG

The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vuln...

2010
Erik Jenelius

Disruptions in the transport system can have severe impacts for affected individuals, businesses and the society as a whole. In this research, vulnerability is seen as the risk of unplanned system disruptions, with a focus on large, rare events. Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally as an integrated part of the planning pro...

Journal: :JNW 2009
Dong Wang Chen Liu

IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with openarchitecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and model-based research results are lacked. Based on TVRA method, this paper establishes a comprehensive vulnera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید